Skip to main content

A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching

  • Conference paper
Book cover Digital Watermarking (IWDW 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5450))

Included in the following conference series:

Abstract

In this paper, a new steganographic algorithm is proposed where embedding is done by swapping two randomly chosen pixels in a gray scale cover image. Proposed steganographic scheme inherently preserves first order image statistics such as image histogram and thus remains undetectable against histogram based spatial domain steganalytic attacks. Experimental results show that the proposed scheme clearly outperforms LSB matching and its improved version against existing targeted attacks. The proposed scheme also remains almost undetectable against wavelet absolute moment based blind attack at low embedding rates for never compressed image dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Westfeld, A., Piftzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Processing 51(7), 1995–2007 (2003)

    Article  MATH  Google Scholar 

  3. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001)

    Article  Google Scholar 

  4. Westfeld, A.: Detecting low embedding rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324–339. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, pp. 131–142 (2003)

    Google Scholar 

  6. Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal processing letters 12(6), 441–444 (2005)

    Article  Google Scholar 

  7. Zhang, J., Cox, I.J., Doerr, G.: Steganalysis for LSB Matching in Images with High-frequency Noise. In: Proc. IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 (October 1-3, October 19, September 16) pp. 385–388 (2007)

    Google Scholar 

  8. Huang, F., Li, B., Huang, J.: Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels. In: Proc. IEEE International Conference on Image Processing, ICIP 2007, vol. 1, pp. 1401–1404 (2007)

    Google Scholar 

  9. Fridrich, J., Soukal, D., Goljan, M.: Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 595–606 (2005)

    Google Scholar 

  10. Holotyak, T., Fridrich, J., Soukal, D.: Stochastic approach to secret message length estimation in ±k embedding steganography. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia contents VII, vol. 5681, pp. 673–684 (2005)

    Google Scholar 

  11. Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 273–274. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, ser., January 2006, vol. 6072, pp. 1–13 (2006)

    Google Scholar 

  13. Hetzl, S., Mutzel, P.: A graph theoretic approach to steganography. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 119–128. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Cachin, C.: An information theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  15. Schaefer, G., Stich, M.: UCID - An Uncompressed Colour Image Database. In: Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–480 (2004)

    Google Scholar 

  16. Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  17. Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sur, A., Goel, P., Mukhopadhyay, J. (2009). A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04438-0_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04437-3

  • Online ISBN: 978-3-642-04438-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics